Search results for "ATTAC"
showing 10 items of 610 documents
Quality of attachment, family relationships and socio-cultural influences in adolescents affected by eating disorders: a pilot research
2008
The mediating role of vulnerability factors in the association between attachment and internalizing/externalizing problems
2015
Recent research indicates that secure attachment is a protective factor against the development of internalizing / externalizing behavioral problems (Laible et al., 2000), while the role of insecure attachment is more controversial, raising the question of potential mediating variables (Brumariu & Kerns, 2010). In literature it emerges how Blatt’s two-configurational model (self-definition and relatedness) correlates on the one hand with the attachment (Luyten & Blatt, 2011; Mikulincer & Shaver, 2007), and on the other with the internalizing / externalizing spectrum (e.g. Campos, Besser, Morgado, & Blatt, 2014). This research has explored the mediation effects of relatedness (dependency) an…
Psicobiologia dell'attaccamento
2008
In this work, the emotional and cerebral development of the individual is treated as a complex process, within which genetic and experiential factors interact; equal focus is given to these factors as is through the interactions of both that the human brain achieves full maturity. The recent literature on neuroscientific findings has allowed to understand further which are the mechanisms that play the most important role in the human brain. In particular, this recent work has pointed out the importance of precocious experiences of emotional syntonization between the baby and its development partners; the quality of the experiences that such partners will be able to provide will configure no…
Il legame di attaccamento ai genitori e ai pari come predittore dell’autostima e dell’ego-resiliency.
2017
The aim of this study was to analyse the relationship between the quality of attachment relationships with parents and peers on the one hand, and ego-resiliency and self- esteem on the other hand. The present research was conducted with a group of 218 students (male = 101) aged from 11 to 19 years (M = 14.43, DS = 2.60). The results emphasize that (a) self-esteem is positively associated only with security of attachment to the mother, (b) ego-resil- iency is positively associated with security of attachment both to mother and peers, and (c) boys seem to have higher levels of self-esteem and ego-resiliency than girls.
Nothing Left but the Core of Murmurs? : Attacks on Linking as Communication in Beckett’s The Unnamable
2022
Literary studies have usually interpreted Samuel Beckett’s The Unnamable (1959) to reflect an area void of meaning and inaccessible to representation. The present article, by contrast, argues that Beckett experientially communicates archaic psychic reality where certain contents develop in an interpersonal relationship. The article offers psychoanalytical close readings of a few key passages in the text, where the function that is integrated in the narrative voice and actively destroys connections manifests itself on different textual levels. Using the psychoanalyst Avner Bergstein’s interpretation of Wilfred Bion’s concept, “attacks on linking”, as a paradoxical form of communication, the …
Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods
2022
Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that…
Tactical Analysis of the Winners' and Non-Winners' Performances in a Taekwondo University Championship
2014
The purpose of this study was to identify tactical characteristics of successful athletes who competed in a National University Championship. Results from the study allow taekwondo coaches and competitors to orient their training towards evidence-based practice to achieve success in competitions. Overall, taekwondo athletes performed more attacks than counterattacks. However, winners performed more counterattacks than non-winners. Moreover, winners performed more anticipatory counterattacks (ANC) and less indirect attacks (INA) than non-winners. Lastly, the order of the performance of the actions for non-winners was by decreasing frequency direct attack (DIA), INA, posterior counterattack …
The Complement System: Activation and Control
1985
One of the hallmarks of immunology has been analysis and characterization of the C system in biological fluids. It is composed of 11 proteins of the “classical” pathway:1 C1q, C1r, C1s, C4, C2, C3, C5, C6, C7, C8, and C9. There are three proteins of the “alternative” pathway (IUIS-WHO Nomenclature Committee 1981) B, D, and P. Finally, there are four control proteins: C1 inhibitor (Cl¯ INH) and C4b binding protein (C4b-bp) for the classical pathway, I (C3b inactivator or C3b INA) and H (β1 or C3b INA accelerator) for the alternative pathway, and anaphylatoxin inactivator. Due to the dramatic advances in protein chemistry, these 19 distinct serum proteins have been highly purified and charact…
Contributo per una visione contemporanea dell’azienda agricola: tra sostenibilità e sfide del mondo digitale
2023
Le sfide che l’umanità sta affrontando e da cui dipende la sopravvivenza del pianeta, il diffondersi nell’ambito dell’attività agricola di tecnologie digitali sempre più avanzate e la necessità di adottare un approccio sostenibile che preservi le risorse a tutela delle generazioni future hanno condotto l’azienda agricola a cambiare gradualmente volto. Questo libro mira a contribuire a un’aggiornata riflessione sul ruolo dell’imprenditore agricolo e dell’azienda da lui condotta, osservandone l’organizzazione e composizione alla luce delle regole che oggi la disciplinano e guardando alle innovazioni necessarie a garantire il raggiungimento dei pressanti obiettivi climatici e ambientali verso …
Trusted Computing and DRM
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …